Skip to content

Lynnrya/SecretCodes

Repository files navigation

SecretCodes

This repository contains the source code for the paper:

Ruoyan Lin, Shishuai Yang (✉️), Fenghao Xu, and Wenrui Diao (✉️). Dialing Danger: Large-Scale Mining and Risk Assessment of Android Secret Codes in OEM Firmware. The 33rd IEEE International Conference on Software Analysis, Evolution, and Reengineering, Limassol, Cyprus. March 17-20, 2026.

Install

  • Python Version: 3.10.6
pip install -r requirements.txt 

Code Structure

1. Secret Code Extraction

  • Place the test APKs in the ./TestApk directory following the folder structure of brand - firmware - APKs.
  • Decompile APKs. If jadx is not used, specify the file path using setAPK.
  • Set the vendor-defined secret code actions in ./PreProcess/custom_action.txt.
  • The files are output to the ./TestData directory.
python ./PreProcess/pre_process.py

2. Function Analysis

  • The files are output to the ./Examination directory.
python ./main.py

3.LLM Inference

  • The files are output to the ./ReasonableResults directory.
python ./reasonableCheck.py

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •